CVE-2024-36586
https://notcve.org/view.php?id=CVE-2024-36586
An issue in AdGuardHome v0.93 to latest allows unprivileged attackers to escalate privileges via overwriting the AdGuardHome binary. • https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36586.md • CWE-269: Improper Privilege Management •
CVE-2024-36587
https://notcve.org/view.php?id=CVE-2024-36587
Insecure permissions in DNSCrypt-proxy v2.0.0alpha9 to v2.1.5 allows non-privileged attackers to escalate privileges to root via overwriting the binary dnscrypt-proxy. • https://github.com/go-compile/security-advisories/blob/master/vulns/CVE-2024-36587.md • CWE-266: Incorrect Privilege Assignment •
CVE-2024-30376 – Famatech Advanced IP Scanner Uncontrolled Search Path Element Local Privilege Escalation Vulnerability
https://notcve.org/view.php?id=CVE-2024-30376
This vulnerability allows local attackers to escalate privileges on affected installations of Famatech Advanced IP Scanner. ... An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of an administrator. •
CVE-2024-5907 – Cortex XDR Agent: Local Privilege Escalation (PE) Vulnerability
https://notcve.org/view.php?id=CVE-2024-5907
A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit. Una vulnerabilidad de escalada de privilegios (PE) en el agente Cortex XDR de Palo Alto Networks en dispositivos Windows permite a un usuario local ejecutar programas con privilegios elevados. Sin embargo, la ejecución requiere que el usuario local aproveche con éxito una condición de ejecución, lo que hace que esta vulnerabilidad sea difícil de explotar. • https://security.paloaltonetworks.com/CVE-2024-5907 • CWE-269: Improper Privilege Management •
CVE-2024-5742 – Nano: running `chmod` and `chown` on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file
https://notcve.org/view.php?id=CVE-2024-5742
A vulnerability was found in GNU Nano that allows a possible privilege escalation through an insecure temporary file. If Nano is killed while editing, a file it saves to an emergency file with the permissions of the running user provides a window of opportunity for attackers to escalate privileges through a malicious symlink. • https://access.redhat.com/security/cve/CVE-2024-5742 https://bugzilla.redhat.com/show_bug.cgi?id=2278574 https://lists.debian.org/debian-lts-announce/2024/06/msg00006.html https://access.redhat.com/errata/RHSA-2024:6986 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-377: Insecure Temporary File •